Over at internetnews.com, there is a look
at the role the Coverity scanner played in finding the bad code that allowed the recent kernel NULL pointer
exploit. "The issue of patching aside, the public exploit could easily have been a zero day exploit on the Linux kernel itself, were it not for the fact that the bug that enables the exploit was caught by a scan from code scanning vendor Coverity. The Linux kernel has been actively scanned by Coverity since at least 2004 in an effort to find bugs and improve code quality.
to post comments)